Search Website

Validating credentials, please wait...
  • General Inquiries 1-571-481-9307

  • Fax 1-202-315-3003

Home

Schedule

Schedule
Class Schedule of Courses
May
22
Mon
2017
Risk Management Framework (RMF) for DoD and Intelligence Communities Information Technology (IT) – 3-Day – In-Depth @ Arlington, VA
May 22 @ 8:00 am – May 25 @ 4:00 pm

Course Description:

Lunarline offers the most comprehensive and detailed hands-on training for students who want to gain an understanding of the pending transition from DIACAP to RMF for DoD IT. Our training is based upon participation of our subject matter experts in transition working groups and direct experience with other Federal,Wa DoD and commercial clients. In compliance with the Federal Information Security Management Act (FISMA), Federal agencies and the Intelligence Community have already transitioned to the use of the NIST Risk Management Framework (RMF) as the foundation for their assessment and authorization (A&A) processes, formerly known as certification and accreditation (C&A). DoD is now in the process of establishing the regulatory foundation for their transition to the use of the NIST RMF. This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Risk Management Framework (RMF) for DoD and Intelligence Communities Information Technology (IT) – 4-Day – Intensive @ Arlington, VA
May 22 @ 8:00 am – May 25 @ 4:00 pm

Course Description:

Lunarline offers the most comprehensive and detailed hands-on training for students who want to gain an understanding of the pending transition from DIACAP to RMF for DoD IT. Our training is based upon participation of our subject matter experts in transition working groups and direct experience with other Federal,Wa DoD and commercial clients. In compliance with the Federal Information Security Management Act (FISMA), Federal agencies and the Intelligence Community have already transitioned to the use of the NIST Risk Management Framework (RMF) as the foundation for their assessment and authorization (A&A) processes, formerly known as certification and accreditation (C&A). DoD is now in the process of establishing the regulatory foundation for their transition to the use of the NIST RMF. This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Securing Wireless Networks – 4 Day – Intensive @ Kettering, OH
May 22 @ 8:00 am – May 25 @ 4:00 pm
Course Description

Lunarline’s 4 day hands on course will focus on understanding exploits and vulnerabilities in a Wireless network. Students will gain knowledge to design and implement a secured wireless infrastructure while ensuring confidentiality, integrity, and availability.

Jun
6
Tue
2017
Cloud Security Fundamentals & FedRAMP 3 Day @ Arlington,Va
Jun 6 @ 8:30 am – Jun 8 @ 4:00 pm

The 3-day Cloud Security and FedRAMP course provides students with an in-depth knowledge of cloud security requirements, cloud security issues, cloud computing architecture and security concepts for the three types of cloud computing: Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS), and explains what cloud service providers and agencies must do to understand the latest guidance provided by NIST and to meet the requirements for the Federal Risk and Authorization Management Program (FedRAMP).

Jun
13
Tue
2017
Risk Management Framework (RMF) for DoD & Intel Information Technology In-Depth 3 Day @ Arlington,Va
Jun 13 @ 8:30 am – Jun 15 @ 4:00 pm
Course Description

Lunarline offers the most comprehensive and detailed hands-on training for students who want to gain an understanding of the pending transition from DIACAP to RMF for DoD IT. Our training is based upon participation of our subject matter experts in transition working groups and direct experience with other Federal,Wa DoD and commercial clients. In compliance with the Federal Information Security Management Act (FISMA), Federal agencies and the Intelligence Community have already transitioned to the use of the NIST Risk Management Framework (RMF) as the foundation for their assessment and authorization (A&A) processes, formerly known as certification and accreditation (C&A). DoD is now in the process of establishing the regulatory foundation for their transition to the use of the NIST RMF. This training will enable your organization to understand the proposed changes and to position yourself early to make the transition as seamless and efficient as possible.

Risk Management Framework (RMF) for DoD & Intel Information Technology Intensity 4 Day @ Arlington,Va
Jun 13 @ 8:30 am – Jun 16 @ 4:00 pm

This course equips the student with an overview of the system authorization process (also known as C&A) and the Risk Management Framework (RMF) for National Security Systems (NSS).  In addition to the classroom instruction, the student will also participate in several scenario-based hands-on exercises in the implementation of the RMF using the CNSS and IC requirements to provide a clear knowledge bridge to the revised system authorization processes for those currently working with C&A for National Security Systems or for those who have limited or no C&A experience. These exercises will include the development of Systems Security Plans (SSPs), Security Assessment Reports (SARs), and Plans Of Action and Milestones (POA&Ms) for a NSS.  This course meets the requirements of National Security Directive 42 (NSD-42), which outlines the roles and responsibilities for securing NSSs. The CNSS In-Depth Course will address the Federal and Intelligence Community requirements, including NIST SP 800-37, NIST SP 800-39, and CNSS 1253.

 

The fourth day of this Intensity course provides each student with a hands on experience in using automated vulnerability assessment and other tools used to support the Federal and CNSS system authorization process.

 

Modules:

1:  Critical Definitions and Policies

2:   C&A Transformation/Transition Overview

3:   The IC and the Transformation

4:   Roles and Responsibilities

5:   Accreditation Boundary

6:   System Categorization

7:   Select Security Controls

8:   Implement, Document & Assess Security Controls

9:   Authorize Information System

10:  Monitor Information System

11:  Reciprocity

12:   Supporting Tools and Testing

13:   Certification Testing

 

Course Material

Students will be provided access to our online learning environment and will have 24/7 access to their course material. Students are required to bring a tablet or laptop with an installed modern web browser because exams and other exercises are conducted through the SCS online learning environment.

Students’ need to make sure that the system is properly configured with all the drivers necessary to utilize the tools required for the course exercises. You can use any 64‑bit version of Windows, Mac OSX, or Linux as your core operating system that also can install and run VirtualBox virtualization software. It is critical that your CPU and operating system support 64‑bit so that our 64‑bit guest virtual machine will run on your laptop. Please download and install the latest version of VirtualBox on your system prior to class beginning.

The course includes a VirtualBox image file of a guest Linux system that is larger than 12 GB. Therefore, you need a file system with the ability to read and write files that are larger than 3 GB, such as NTFS on a Windows machine.

MANDATORY SYSTEM HARDWARE REQUIREMENTS:

  • CPU: 64‑bit Intel i5 x64 2.0+ GHz processor or higher based system is mandatory for this class (Important ‑ Please Read: a 64‑bit system processor is mandatory)
  • RAM: 4 GB (Gigabytes) of RAM minimum (Note: We strongly recommend 8 GB of RAM or higher to
    get the most out of the course)
  • Host Operating System: Fully patched & updated Windows (7+), MAC OSX (10.10+), or recent
    version of Linux operating system (released 2014 or later) that also can install and run VirtualBox
    software. Please note: It is necessary to fully update your host operating system prior to the class to
    ensure you have the right drivers and patches installed to utilize the latest USB 3.0 devices. Those
    who use a Linux host must also be able to access ExFAT partitions using the appropriate kernel or
    FUSE modules.
  • Networking: Wireless 802.11 B, G, N, or AC
  • USB 3.0 Port(s) – highly recommended
  • 200+ Gigabyte Host System Hard Drive minimum
  • 150 Gigabytes of Free Space on your System Hard Drive – Free Space on Hard Drive is critical.
  • The student should have the capability to have Local Administrator Access within their host operating system and BIOS settings
Certifications:

You will receive your National Security Agency (NSA) and Committee on National Security Systems (CNSS) NSTISSI 4011, Information System Security Professional and CNSSI 4012, Senior IA System Manager Certificate.  As well as earning CPE’s to your existing certifications with CompTIA, ISC2 and ISACA.

 

Jun
27
Tue
2017
Ethical Hacking & Penetration Testing @ Arlington,Va
Jun 27 @ 8:30 am – Jun 30 @ 4:00 pm

Vulnerability scanning and security audits alone will not ensure the security of an organization because they only test for currently known vulnerabilities with little to no analysis of how these vulnerabilities may be exploited. To ensure that systems are adequately protected, administrators must probe networks and assess the security posture for vulnerabilities and exposed surfaces while attempting to exploit them.  Penetration testing fills a vital organizational need by confirming information security policies are both adequate and sufficiently implemented to protect against novel attacks.

Securing Wireless Networks 4 Day @ Arlington,Va
Jun 27 @ 8:30 am – Jun 30 @ 4:00 pm
Course Description

Lunarline’s 4 day hands on course will focus on understanding exploits and vulnerabilities in a Wireless network. Students will gain knowledge to design and implement a secured wireless infrastructure while ensuring confidentiality, integrity, and availability.

Jul
11
Tue
2017
Ethical Hacking & Penetration Testing @ Arlington,Va
Jul 11 @ 8:30 am – Jul 14 @ 4:00 pm

Vulnerability scanning and security audits alone will not ensure the security of an organization because they only test for currently known vulnerabilities with little to no analysis of how these vulnerabilities may be exploited. To ensure that systems are adequately protected, administrators must probe networks and assess the security posture for vulnerabilities and exposed surfaces while attempting to exploit them.  Penetration testing fills a vital organizational need by confirming information security policies are both adequate and sufficiently implemented to protect against novel attacks.

Risk Management Framework (RMF) for DoD Security Controls Assessors (SCA) @ Kettering, OH
Jul 11 @ 8:30 am – Jul 14 @ 4:00 pm

This 4-day course concentrates on methods used to validate DoD IA Controls as contained in NIST 800-53, Rev. 4 and CNSSI 1253.  Discussion areas include an overview of the RMF for Intelligence Communities and DoD Security Controls Assessors, the DoD-defined information system types and the associated security concerns, vulnerability scanning, DoD-approved automated scanning tools, and many more.  The course provides an in-depth explanation of each control identified in NIST 800-53, Rev. 4 and CNSSI 1253 to include the appropriate testing method, associated supporting evidence (known as artifacts), and how to more efficiently and effectively test and validate DoD systems and infrastructure. The curriculum will prepare the ACA to test against the DoD IA controls using manual and automated procedures in accordance with the standards set forth by the Department.

Jul
18
Tue
2017
Cyber Tools & Analysis 4 Day @ Arlington,Va
Jul 18 @ 8:00 am – Jul 21 @ 5:00 pm

This hands-on 4-day course provides participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution.  Upon completion of this course, each participant will be able to define cybersecurity terminology, compliance requirements, review sample attacks, and gain an understanding of the impact of current threat trends on cybersecurity implementation.

Jul
25
Tue
2017
Risk Management Framework (RMF) for Federal Systems Security Controls Assessors (SCA) 4 Day @ Kettering, OH
Jul 25 @ 8:30 am – Jul 28 @ 4:00 pm

This course provides an in-depth look at testing the controls using NIST SP 800-53A and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 3 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A and NIST SP 800-115, what evidence should be gathered, and how to more efficiently and effectively test Federal systems and infrastructure. The curriculum will introduce the independent tester or Validator to test the process for any of the Federal IA controls using manual and automated tests to ensure all controls are tested properly.

Risk Management Framework (RMF) for Federal Systems Security Controls Assessors (SCA) 4 Day @ Kettering, OH
Jul 25 @ 8:30 am – Jul 28 @ 4:00 pm

This course provides an in-depth look at testing the controls using NIST SP 800-53A and ensuring the use of the Risk Management Framework (RMF) for Federal Security Systems. The focus of the course is an in-depth explanation of each NIST SP 800-53 Revision 3 controls to include what method should be used to test and validate each security control in accordance with NIST SP 800-53A and NIST SP 800-115, what evidence should be gathered, and how to more efficiently and effectively test Federal systems and infrastructure. The curriculum will introduce the independent tester or Validator to test the process for any of the Federal IA controls using manual and automated tests to ensure all controls are tested properly.

Jul
26
Wed
2017
Counterintelligence for IT/Cyber Professionals – 2 Day @ Arlington,Va
Jul 26 @ 8:30 am – Jul 27 @ 4:00 pm

Lunarline’s 2 day hands on course will focus on counterintelligence activities identified by The Comprehensive National Cybersecurity Initiative as it relates to DoD systems.  Students will gain a working knowledge of detecting, deterring, neutralizing, and exploiting threats that could be introduced into a computing environment.

Aug
22
Tue
2017
Cyber Security Fundamentals Intensity @ Arlington,Va
Aug 22 @ 8:30 am – Aug 25 @ 4:00 pm

This hands-on 4-day course provides participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution.  Upon completion of this course, each participant will be able to define cybersecurity terminology, compliance requirements, review sample attacks, and gain an understanding of the impact of current threat trends on cybersecurity implementation.

$0.000 items